Claim Missing Document
Check
Articles

Found 2 Documents
Search

Efisiensi Energi Sistem Operasi Mobile Menggunakan Chip Cheetah X1 Infinix Rakhmadi Rahman; Fadhil Aditya; Meiana Sahabuddin
JURNAL PENELITIAN SISTEM INFORMASI (JPSI) Vol. 2 No. 3 (2024): Agustus : JURNAL PENELITIAN SISTEM INFORMASI
Publisher : Institut Teknologi dan Bisnis (ITB) Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54066/jpsi.v2i3.2196

Abstract

This journal discusses the energy efficiency of mobile operating systems using the Infinix Cheetah X1 chip. The study evaluates the chips’s ability to manage power consumption without compromising performance, focusing on battery optimization, charging performance under extreme temperatures, and bypass charging tecnology. Empirical testing on the Infinix Note 40 using tools like CPU-Z and 3C Battery Manager shows that the Cheetah X1 chip enhances charging efficiency and maintains optimal device temperature. However, its impact on overall battery life is minimal, demonstrating normal power cusumpition levels for a smartphone with a 5000 mAh battery. Overall, the chip improves user experiences through innovative charging features and effective power management, although its effect on extending battery life is limited.
Pengujian Penetrasi Jaringan Lokal dengan Metasploit Framework Fadhil Aditya; Andi Mahrani; Rakhmadi Rahman
Jejak digital: Jurnal Ilmiah Multidisiplin Vol. 1 No. 4 (2025): JULI (Edisi Spesial)
Publisher : INDO PUBLISHING

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63822/sht2dr90

Abstract

Local network security is a vital component in maintaining the integrity and confidentiality of data in information systems. This study aims to identify and evaluate the vulnerability of the Windows 7 operating system through penetration testing using the Metasploit Framework. The method used is an experiment with attack si mulation in a controlled virtual environment. The test target is a Windows 7 system that has not received the MS17-010 security patch and still activates the SMBv1 protocol. The EternalBlue exploit (CVE-2017-0144) is used to exploit the vulnerability. The test results show that the exploitation was successful, marked by the acquisition of Meterpreter shell access to the target system, as well as the ability to retrieve system information and desktop screenshots. These findings confirm that systems that have not been updated are highly vulnerable to remote code execution attacks. This study recommends the application of security patches, disabling SMBv1, and configuring firewalls as crucial mitigation steps. The results of this study are expected to be a reference in the practice of evaluating local network security, especially in infrastructure that still uses old operating systems.